Skip to content
Get a Demo
    curve design on left

    The Cado Blog

    Read timely commentary on the latest in cloud incident response from the Cado Security team.

    blog post featured image
    blog icon Featured Post |

    What’s New In The Cado Platform Q3 2024

    November 19, 2024

    As we continue to enhance and expand the capabilities of the Cado platform, Q3 2024 brings a host of updates designed to improve the...

    Continue Reading
    cloud image
    blog icon Cloud DFIR
    Minimizing Permissions for Cloud Forensics: A Practical Guide to Tightening Access in the Cloud
    September 24, 2024

    In the rapidly evolving landscape of cloud computing, organizations face a critical challenge: how to maintain tight...

    Continue Reading
    blog icon Cloud Investigations
    Cado Security and CrowdStrike: Strengthening Incident Response with Forensic-Driven Insights
    September 19, 2024

    When a cyberattack occurs, time is the most crucial factor. Security teams need to identify the breach, assess the impact,...

    Continue Reading
    blog icon Research & Threat Intel
    From Automation to Exploitation: The Growing Misuse of Selenium Grid for Cryptomining and Proxyjacking
    September 12, 2024

    Cado Security have identified two campaigns targeting the popular web testing tool Selenium Grid. The campaign includes...

    Continue Reading
    Post-Incident: Strengthening Healthcare Cybersecurity Through Continuous Improvement
    September 4, 2024

    Responding to a cybersecurity incident is only the beginning. What happens after the incident is resolved is just as...

    Continue Reading
    Creating a Comprehensive Incident Response Plan for Financial Institutions
    September 3, 2024

    In the world of financial services, where operations run 24/7 and trust is paramount, a well-prepared incident response plan...

    Continue Reading
    The Need for Robust Incident Response Plans in Healthcare
    August 30, 2024

    Healthcare organizations are facing an increasing barrage of cyber threats. The healthcare sector, in particular, has become...

    Continue Reading